By now most of us know a significant amount of information is being gathered about us every time we browse the web.
If not, today is the day to get started. The steps we recommend are a bit time consuming, but necessary. Also, there are many things to consider and likely numerous people in your immediate family for whom these steps will need to be taken.
Continue reading “Have You Dealt With the Equifax Breach?”
It has been a number of weeks since a major flaw was reported in what is called the Wi-Fi Protected Access (WPA) protocol and we have been monitoring the tech blogs to see how this would shake out. Let’s address the protocol and the roll it likely plays in your life.
Defending your systems against malicious threats is best handled by layered protection. We are now offering another layer with a best-in-class Web Protection service that will keep your users safe and productive. It complements traditional antivirus engines and firewalls by letting you define your own content-filtering policies, website blacklists, time-based and content-based browsing policies, and much more.
This service is immediately available! Contact us today to discuss pricing and a roll-out strategy for your team.
Unfortunately, malicious software seems to be hiding in every corner of the Internet these days and for ICS technicians, it feels as though we are playing an unending game of Whac-A-Mole. It is part of our job however and we will keep battling on your behalf!
It has been 2 weeks since the largest ransomeware attack in Internet history. Although it may have been the largest, it certainly wasn’t the first and definitely won’t be the last. Continue reading “Wannacry Ransomware Another Reminder to Stay Vigilant”
Two-Factor authentication (2FA) is available on most major services; think Gmail, Facebook, Twitter, etc. But what is it?
Continue reading “Using Two-Factor Authentication (2FA)? You Should Be”
Do you have a Gmail account? Be informed on this very sophisticated phishing scam so you don’t unknowingly give up your Gmail credentials to hackers.
There is a lot of information all of us probably feel is personal, yet it is publicly available due to property records, business records, utility records, etc. One web site in particular is aggregating your information and offering it to anyone that enters your name in a search. Continue reading “Opt-Out: This Web Site is Publicly Aggregating Your Personal Information”
You should always be cautious of links you receive in email messages, especially when the link is requesting account credential confirmation. Continue reading “Beware a New Amazon Shipping Scam”